Today big data computing is a critical challenge faced by many industries .Everyday up to terabytes to petabytes of the data is generated in the cloud computing paradigm. Thus there is a drastic demand for building a service to distribute, manage and process massive data sets that has risen tremendously. Engineers and researchers are dealing with these large dataset. In this paper, we investigate the big data broadcasting problem for single source node to broadcast a big chunk of data to a set of nodes with the objective of minimizing the maximum completion time. These nodes may be present in the same data center or across geo distributed data centers. We model the big data broadcasting problem into a LOCKSTEP BROADCAST TREE (LSBT).The main idea of this model is to define a basic unit of upload bandwidth r, such that a node with capacity c broadcast a data to a set of nodes at the rate r. We divide the broadcast data into m chunks. These data chunks can then be broadcasted using a pipeline approach.
Fuzzy Based Contrast Enhancement Method for Lung Cancer CT Images
Rakesh Kumar Khare G. R. Sinha Sushil Kumar
Computer aided diagnosis (CAD) has become most commonly used tool in the diagnosis and analysis of medical images such as Lung cancer detection, Brest cancer detection etc. Different type of medical image modalities are used in the diagnosis process by radiologist and physician such as radiographic images ,computer tomography (CT) images, magnetic resonance images (MRI), positron emission tomography (PET) etc. In all analysis if the image quality is not proper then the performance of the CAD system is adversely effected. This work proposed a new Background suppressed fuzzy contrast enhancement (BSFCE) method to improve contrast of the CT images of lung cancer patient. The performance of proposed method have been extensively evaluated and compared with the two existing contrast enhancement techniques Histogram Equalization (HE) and Adaptive Histogram Equalization (AHE) techniques in terms of Mean, Variance and Contrast-per-pixel (CPP).The results reflects that the proposed method outperforms the HE and AHE techniques.
Secured access using Cognitive Services on Raspberry Pi
Rosch Goes Dr. Suchithra Nair
The issue of Security is very paramount in any organization. Most security systems have a variety of components which can include finger print scanners, retina scan, rfid tag detectors as well as a keypad that allows users to input pins to gain access. These components can either be hardwired, which requires a contractor to drill and run wires throughout the house, or wireless, which allows for easy installation and replacement. And among them face recognition is the one which is attracting a lot of attention in society of security access. Few confidential Areas like bank vaults, critical server locations etc. need to be secured, and is possible through facial recognition system. In this paper an explanation on creating a low-cost stand-alone device is showcased using Facial Recognition technology to process and identify authorized personnel. The project is developed using Microsoft’s cognitive service. The implementation of the project is done using Raspberry Pi.
Twitter is prone to malicious tweets containing URLs for spam, phishing, and malware distribution. Conventional Twitter spam detection schemes utilize account features such as the ratio of tweets containing URLs and the account creation date, or relation features in the Twitter graph. The techniques misses’ one major factor in the assessment and that is the content of the tweets. So basically we have developed software which on the basis of content of the tweet classifies using naïve bayes classifier whether the tweet is positive or negative. Also we have gone a level up with this software and that is, not only profile specific assessment of tweets can be done but also a person can search for words and look into the tweets that contain the word twitter wide to get individual assessment of the tweets as well as overall statistical data in form of a pie chart. Content specific assessment is important because one can have a verified twitter account with all the technical parameters satisfying and can still spread malicious content or the account could be hacked in to spread malicious content. For the solution, we have come up with the software.
M Manasa Ravali, Vemula K Harika M Chaithanya Kishore Reddy
Cut Detection in Wireless Sensor Networks
M Manasa Ravali, Vemula K Harika M Chaithanya Kishore Reddy
A wireless sensor network (WSN‟s) can be separated into multiple connected components due to the failure of some of its nodes, which is called a “cut.” In this paper, here the considered problem of detecting cuts by the remaining nodes of a wireless sensor network. By the proposal an algorithm that allows 1) Each and every node to detect when the connectivity to a specially designated node has been lost. 2) One or more nodes (that are connected to the special node after the cut) to detect the occurrence of the cut. The algorithm is distributed and asynchronous: Every node needs to communicate with only nodes which are within its communication range. The algorithm is based on the iterative computation of a fictitious “Electrical Potential” of the nodes. The convergence rate of the underlying iterative scheme is independent of the size and structure of the network. We demonstrate the effectiveness of the proposed algorithm through simulations and a real hardware implementation
MS Tanusree ghorui, Prof. Samir Kumar Bandyopadhyay
Asymmetric key algorithms-A Proposed Method
MS Tanusree ghorui, Prof. Samir Kumar Bandyopadhyay
Asymmetric key algorithms use different keys for encryption and decryption. The encryption key is public, decryption key is secret. Anyone can encrypt a message but only the one who knows the corresponding private key can decrypt it. This paper discuss asymmetric key algorithms with its advantages and disadvantages.
Real-time location based service for tracing mobile using Android Application
M.Prasanna Lakshmi E.Venkateswara Rao B. Lakshmi
The main theme of phone finder mobile application is to provide an android application to the users that act as antitheft as well as remote control too. This android application basic functionality is providing protection from the theft. The application has capacity to send the SMS along with location coordinates (longitude, latitude) to the registered mobile number. This application also has capable to execute the tasks by processing the SMS from the parent mobile (registered mobile).The user can control the mobile functionalities like WLAN, mobile modes (general, vibrate, silent).It has the capacity play an alert sound even through it was in silent mode. This helps the user to find the mobile if he misplaced somewhere in surroundings.
The e-KYC ticketing system is the new way to book the tickets like bus ticket, train ticket, flight ticket, and other ticket bookings. The main purpose of the e-KYC ticketing system is to ensure the safe and secure journey of oneself and other fellow passengers. The e-KYC ticketing System is a new way to verify the passengers having journey on bus, train, flight etc. The e-KYC system permits ticket booking to the verified passengers only. This system will ask the Universe Identity Number as we have universe identity in India like Aadhar Card. Without the Aadhar card people will not be able to travel by any mode of transport. The e-KYC ticketing system uses two way verifications. The first verification happened before booking the ticket. The user needs to give his Aadhar card number to register them on the website. If they are not having Aadhar card then they cannot book the ticket. The second verification takes place when the TT comes to check the ticket. Her e TT will be having a device which will ask the ticket number and the thumb impression of the passenger. This thumb print will be matched with the existing database. If it match then he can travel in the train else an e-mail will be sent to railway department and the journey of the particular pass anger will be denied.
A Review on Trust and Security by using Intrusion Detection System in Mobile Ad Hoc Network
Rammurti Gupta, Raj Kumar Paul
Mobile Ad hoc Network (MANET) is a Self- wireless network for mobile gadgets. It does now not require any steady infrastructure to be configured which makes it additional suitable for use in environments that require on-the-fly setup. Ad-hoc networking can also be applied wherever the place there's little or no conversation infrastructure or the existing infrastructure is highpriced or inconvenient to use. In this network, nodes communicate wirelessly which makes securing a mobile ad -hoc network is very challenging. The IDS is a process for detecting the attacks by analyzing and regularly monitoring network services. For detecting malicious node trust is calculated and attaining the security.
Kumar Harsh , Mayank Yadav Amit Kumar B. Chandra Mohan
IOT Based Calorie Calculator For Healthcare System
Kumar Harsh , Mayank Yadav Amit Kumar B. Chandra Mohan
The Internet of Things (IoT) makes brilliant items a definitive building hinders in the improvement of digital physical savvy inescapable systems. The IoT has an assortment of utilization areas, including human services. In the existing system there is no system for analyze step count and medical fitness analysis together. The proposed system is trying to calculate the temperature, blood pressure and heartbeat measurement. In modification part, we include touch sensor based Hardware for measuring step count and calorie burnt in the human body and further blood pressure is measured and updated status to be stored in cloud server. Reminder notification is also included to alert on the phone through messages by using GSM. The system can be used in any big pharma or medical organisation where a large number of patients come, the details of every patient is updated on the web server and the pharma doctor can access the details from anywhere and give the prescription accordingly. The patient also get notification on their mobiles.
Intelligent Method for Cost Estimation during Software Maintenance
Durga Puja Raghav Mehra BD Mazumdar
Software maintenance is very important and time consuming task which require a lot of parameters to be taken care during the whole cycle of maintenance of software. The software maintenance engineer has used various cost estimation models in their research work like COCOMO-I, COCOMO-II, SLIM, SEERSEM and FP. The problem with these models is that they require the complete data and information making any decision and benchmark. Therefore the cost of software maintenance varies with types and complexity of the software under the maintenance. We have identified the various factors which effects the cost of the software maintenance. The various cost estimation models require a lots of metrics and only after calculating the complete parameters, then only the software cost can be determined.
Literature Survey of Privacy Preserving Data Publishing (PPDP) Techniques
Amita Sharma, N. Badal
Microdata-Information collected by different organizations is published for analysis to the analyst, decision makers, policy makers and researchers. Original data is not published due to some privacy issues. So, techniques are needed to preserve privacy of data. This paper includes the comparative study of various techniques available to preserve the privacy of published data.
Practical knowledge is an important and essential skill required by every engineer. For obtaining this skill, an apartment building is analysed and designed, Located in Latur, Maharastra with (B+G+10) storeys having a car parking facility provided at basement floor. The building has a shear wall around the lift pit. The modelling and analysis of the structure is done by using ETABS and the designing was done. Design of slab, stair case and an isolated footing are done manually. The design methods involves load calculations manually and analysing the whole structure by ETABS. The design methods used in ETABS are limit state design confirming to IS code of practice.Along with analysing and designing of this building, construction sites were also visited.
A Clustering Technique for Improving Marketing Strategy in Social Media using Data Mining Approach
Shreyas S, Dr. Vidya Raj C
On-line Social Networks (SNSs) are today one of the most popular interactive medium to communicate, share and disseminate a considerable amount of human life information. Daily and continuous communications imply the exchange of several types of content, including free text, image, and audio and video data. The huge and dynamic character of these data creates the premise for the employment of web content mining strategies aimed to automatically discover useful information dormant within the data which helps marketing. This paper aims to focus on four important works i.e. identifying the target users, designing of market strategy/plan, Building the marketing network (groups) & Statistical analysis of categories. Influentially of target user has been discussed with real time instances. Categories have been found based on their influence by using clustering technique. Finally, concluded with statistical analysis that includes graphical representation of highly influenced users. Further this paper helps to extract emotional feelings of the user so that any related articles, posts or videos can be posted to that user.
Stream data mining is the process of excerpting knowledge structure from large, continuous data. For stream data, various techniques are proposed for preparing the data for data mining task. In recent years stream data have become a growing area for the researcher, but there are many issues occurring in classifying these data due to erroneous and noisy data. Change of trend in the data periodically produces major challenge for data miners. Column oriented data storage has shown fast access to data used in data mining. Various missing value replacement algorithms are implemented using MonetDB. This research also concentrates on incremental missing value replacement for stream data. The proposed method generates the value for the missing data considering the data type and data distribution. It also considers the concept drift in the data stream. The method will applied to different datasets and promising results will be expected
PSO-Based Support Vector Machine Technique with Cuckoo Search For Lungs Cancer Diagnosis
Dr.K.Mahalakshmi Ms.R.Keerthika Ramyadevi
Disease diagnosis is conducted with a machine learning method. World Health Organization (WHO) reports that worldwide 7.6 million deaths are caused by cancer each year. Uncontrollable cell development in the tissues of the lung is called as lung cancer. These uncontrollable cells restrict the growth of healthy lung tissues. If not treated, this growth can spread beyond the lung in the nearby tissue called metastasis and, form tumours. In order to preserve the life of the people who are suffered by the lung cancer disease, it should be prediagnosed. So there is a need of pre diagnosis system for lung cancer disease which should provide enhanced result. We have proposed a novel machine learning method that hybridizes support vector machine (SVM), particle swarm optimization (PSO).The new method consists of two stages: initially, pso based approach for parameter optimization of SVM is developed to find the better initial parameters of kernel function, and then PSO is applied to continue SVM training and find the best parameters of SVM. Experimental results indicate that the proposed PSO-SVM model achieves better classification accuracy and F-measure than PSO-SVM and GASVM. Therefore, we can conclude that our proposed method is very efficient compared to the formerly reported algorithms.
Nowadays consumers are more liking to download a software file from the internet then to purchase it from the market.Due to which we can see that the sales of the computer softwares CDs are declining at a very fast rate. Consumers are downloading software files and storing them in cloud, so the government is looking towards the "cloud". As they think that it can be new source for Tax revenues. Today the sales of the USB drive is declining as consumers are preferring to store data in the cloud, which in turn caused decrement in the sales tax revenue as the sale of the physical goods have decreased, but as the government is looking forward to tax the cloud there are many questions that is arising for the taxing of the cloud.In order to impose a tax, the government must have some jurisdiction over the entity they are taxing
Simulation of Water Level Control in a Tank Using Fuzzy Logic in Matlab.
Mohd Iqbal, Dr.K.A.Khan
With the increasing troubles of indecision, imprecision and ambiguity during the modeling of various control system, the fuzzy logic plays the vital role in it. This paper presents a detailed description of simulation of water level control in a tank using fuzzy logic, which clears that fuzzy logic is an different way to represent linguistic and subjective attributes of the real world. In order to improve the efficiency and simplicity of the design process, fuzzy logic can be applied to simulation of water level control in a tank using MATLAB.This paper design a simulation system of fuzzy logic controller for water tank level control by using Fuzzy Logic Toolbox MATLAB.. This proves that fuzzy logic do a fairly good job than other controlling systems
Effective Feature Selection for Feature Possessing Group Structure
Yasmeen Sheikh, Prof. S. V. Sonekar
Feature selection has become an interesting research topic in recent years. It is an effective method to tackle the data with high dimension. The underlying structure has been ignored by the previous feature selection method and it determines the feature individually. Considering this we focus on the problem where feature possess some group structure. To solve this problem we present group feature selection method at group level to execute feature selection. Its objective is to execute the feature selection in within the group and between the group of features that select discriminative features and remove redundant features to obtain optimal subset. We demonstrate our method on data sets and perform the task to achieve classification accuracy.
Comparative Study of Energy Saving Grid-based heuristic approaches in dispersed computational environment
Rupinder Kaur Rachna Rajput
Completing for huge parallel jobs in dispersed computational environments requires co-distribution for significant resources mutually shared with their possessors. The scheduling plus resource selection complications in Grid remain NPhard because for their combinatorial environment. Various algorithms, depending on heuristic solutions, or their groupings have been implemented for similar jobs with dependences in disseminated environments. Task schedulers target to improve the whole performance for a segment, e.g., decreasing the average work response time and increasing the number for tasks accomplished in certain point for time. A ‘Network’ stands an arrangement aimed at reserve allocation. This stands cast off in huge scale files dispensation, numerous for solicitations presence logical ones. Grid forecast is an important constituent Network structure.
Prospects of Crowd funding Education: A Conceptual Framework
Annie Stephen, Anita Arul,
Let us think of education as the means of developing our greatest abilities, because in each of us there is a private hope and dream which, fulfilled, can be translated into benefit for everyone and greater strength for our nation. –John F. Kennedy. John F. Kennedy‘s quote about the goal of education could very well be applied to the social and economic progress of a country. Crowd funding has emerged in education as a means to make private dreams a reality through collective micro financing. The flip side of the story is that, while a segment of the population receives quality education, most underprivileged kids are deprived of this basic need. College tuition costs have rocketed up over the past decade and experts expect education costs to continue their upward trajectory over the coming years. Crowd funding is the practice of funding a project or venture by raising funds from a large number of people, often performed via internet-mediated registries. The cycle is viscous—you educate one generations follow. By ensuring quality education, one is assured of their right for a better life. In the face of increased competition and diminishing federal funding, some academicians and students are turning to crowd funding platforms to raise money. This paper is intended to study the challenges facing crowd funding and understanding the level of awareness about this emerging source of finance among the masses for the advancement of education.
Student- Teacher relationship has evolved over the WEB CLASS. Through the use of internet, the interaction between student and teacher has increased. So through our project we will create a classroom portal which will provide students effective and interactive learning and at the same it will reduce the work of teachers. Our portal is a new approach of classroom learning. It provides an option for the teachers to upload teaching videos which are related to the topic taught in the class. It provides an opportunity for the students to ask individual doubts in the chat option. This feature is helpful for the students who are afraid to ask doubts in the class. Virtual education is an emerging concept. Here the classes are not taken face-to-face in a classroom but through an electronic medium as a substitute. These virtual classrooms are gaining importance every day and very soon they are going to be an integral part of our world. As the number of Internet access points are growing rapidly, E-Learning is also gaining a new peak. This electronic medium serves best for dissemination of information. E-Learning is proving itself as a boon for students especially for the disabled who are not able to go and attend the lectures. All these emphases the need for developing an Open Source software that can be used to generate rich multimedia presentation for E-Learning.
Now a days internet becomes the most popular for exchange data & information over worldwide. These data & information are available on the internet in the form of digital media. In the era of internet authentication, protection and illegitimate redistribution of digital multimedia has become an essential issue. Digital Watermarking can be used to secure these illegal redistribution and reallocation. Digital Watermarking was invented against illegal work, owners’ authentication and security. Digital Video Watermarking is method to hiding some kind of data like audio, image, text into digital video sequences which is nothing but orders of successive still images. In this paper, we discuss about digital video watermarking techniques, robustness and also present the application where the uses of watermarking techniques and for better performance of video watermarking. We survey on properties of video watermarking, classification of video marking techniques, application and watermark attacks.
The goal of this project is to design a system that will work on most of smart phones and palms which will be helpful when visiting any new place or cities. This system finds a route using user conditions and criteria . Those above mentioned criteria should be simple and natural, like, for example: a list of museums, the most famous historical objects, , constraints to travel by bus and by walking. The system should find a solution that fulfils those criteria, show it on screen, show names of objects, some short descriptions and photos of them and possible entrance costs.
This paper discusses the formulation of a Computer Aided Detection (CAD) system for Lung cancer detection by using an interdisciplinary approach based on the techniques of Image Processing and Machine Learning. This paper is an extension of image processing using lung cancer detection and produces the results of feature extraction and feature selection after segmentation. Here the proposed model is developed using SVM algorithm for feature selection and classification. The system accepts Lung CT(Computed Tomography) images as input. This present work proposes a method to detect the cancerous cells effectively from the CT scan and images. Modified Fuzzy Possibilistic C Means (MFPCM) has been used for segmentation and Gabor filter has been used for De-noising the medical images. Simulation results are obtained for the cancer detection system using the MATLAB software.
A review on Neural Network and Ant Colony Optimization for Vehicle Traffic Analysis and Routing
Er.Manpreet Kaur Er.Gurpreet Singh
This paper contains study regarding artificial neural network and ant colony optimization. An artificial neural network is used for traffic analysis and ant colony optimization is used for finding shortest path. All the previous work regarding the topic did not used the combination of these two techniques. Traffic analysis is very important topic because traffic is increasing on the roads day by day.
Survey of Intentional Enterprises Threats using Social Engineering Exploits and Prevention Techniques
Swati Chauhan
this is a survey report of social Engineering threats that include various phases of social engineering. As security techniques increase, security break techniques will also increase in the same or more ratios. In this paper, we are trying to cover most areas of social engineering feats with Cause of social engineering in enterprises, various techniques of social engineering, influences and popular social engineering cases with relative study.
Now-a-days we all have been so unsatisfied with a social service provider like MSEB OR Water supply company that we felt the need to register our grievances with the offending company. Most of the time complaints go unheard, unanswered and unresolved usually because the company is too large to have to worry about one little complaint from one single customer. And this application is here to help. We are aiming to create a mobile application which deals with social complaints and their recovery. This app will be providing the facility of lodging complaints on a mobile phone and track that complaint till its resolved. The various types of complaints could be road repairing, cleaning, emergency services (E.g. Fire, Ambulance)etc. Our idea is to create a mobile application which can help you out with registering the complaints online without the need to have a laptop or desktop with you. Just one click and you can lodge a complaint anywhere, anytime. Our objective of creating this app is to make complaints easier to co-ordinate, monitor and resolve.
Location Based Social Network For Rating Procedure Geographical Location Using Extended Collaborative Algorithm
M.Muralikrishnan G.Kalpana M.Karthikraj
The Rapid Development of the mobile based social networks is to improve the geo-graphical rating procedure, which makes enormous volume of the raw data. In normal mobile user compared to recent trends of the geo-position enabled technology will produce the volume of data is higher than the normal mobile user. The social networks involving geographical information as location-based social networks, this information bring out the new challenge in recommended system to solve the data sparsity problem of data set and cold start problem, in this paper we make the full use of the deeply exploring the user and check-in user for various categories first, user to user geographical connection distance, then user to item geographical distance and one user similarities. Check-in behaviors of users will be deeply explored by considering the above factor their multi-activity centers and the attribute of POIs.
Secure Data Sharing In Cloud Computing By Implementing Amednded Attribute Based Data Sharing Scheme
M.Karthikraj , S.Arunkumar M.Muralikrishnan
Cloud computing, is a booming computing paradigm, allowing users to remotely hoard their data in a server and provide services on-demand. To ensure the data security in the cloud, Data access control is an efficient approach. the data access control turn out to be a challenging issue in cloud storage systems due to data outsourcing and despaired cloud service providers. Cipher text-Policy Attribute based Encryption (CP-ABE) is regarded as one of the most suitable technologies in cloud storage for data access control, since it gives data owners more undeviating control on access policies. However, it is complicated to directly employ existing CP-ABE schemes to data access control for cloud storage systems due to the attribute revocation issue. A data owner (DO) is generally willing to store huge amounts of data in cloud storage system for saving the cost on local data management. Without any of the data security mechanism, The cloud service provider (CSP), however, can completely gain access to all data of the user. Data owner is permitted to fully regulate the access policy correlated with the data which has to be disclosed. However, CP-ABE is limited to a potential security risk that is known as key escrow problem whereby the secret keys was issued by a trusted key authority to the users. In the proposed system, attribute-based data sharing scheme is revisited in order to solve the issue of “key escrow” and also to improve the persuasiveness of attribute, so that the resultant scheme is more gracious to the application that are implemented through cloud computing. An improved two-party key issuing protocol has been implemented that which assure that neither key authority nor cloud service provider can be conceded the whole secret key of a individual user.
The arrival of android platforms with increased storage capabilities, better visualisations, computing competencies and the ubiquitous use of these platforms in the field of e-banking, online banking, business, and the storage of sensitive information on these devices, android platform is becoming the most targeted platform by malwares. They are primarily spread via repackaged apps to piggyback payload, update attacks, and drive by downloads. Malware constitutes a severe menace to user privacy, money, device and file veracity. It is posing benevolence challenges and difficulties to detect such malwares as signature based detection techniques available today are becoming inefficient in sensing new and anonymous malware. Hence we presents machine learning as an emerging era of modified and latest detection techniques. In this paper we will present various machine learning solutions to counter android malwares that analyse features from malicious application and use those features to classify and detect unknown malicious applications. This paper summarizes the evolution of malware detection techniques based on machine learning algorithms focused on the android OS.
Students of Bachelor of Technology in Computer Science, School of Computer Science Engineering, Galgotias University, Greater Noida.
Vanita Dandhwani Dr.Vipul Vekariya
Currently Cloud Computing is fastly growing area in IT world. It provide physical and virtual resources to the users as pay per uses bases. Now a days users of cloud are increasing day by day so to handle a lots of data and tasks are difficult. That’s why proper allocation of tasks to resources is very important factor in cloud computing. Here this paper define an algorithm using K-mean clustering technique for task scheduling in cloud for better outcomes.
Introduction of computer technology in various fields has simplified the job of human being but has also resulted in large amount of digital data. The challenge is managing the large amount of data, i.e. storing and retrieving it. People are sharing, transmitting and storing millions of images every moment. Although data compression is mostly done to avoid occupancy of more memory, and increase capacity of memory devices, The process of reducing data size without losing the crucial information is known as data compression. There is various data compression technique which can use. These techniques can be classified into two types i.e. Lossy and Lossless compression. In this paper some of the lossy image compression is discussed in detail.
Improved Routing Metric In The Overlay Routing Delay Nodes
Kalyani Wasnik, Prof. Shrikant v.Sonekar
Overlay routing is a very attractive scheme that allows improving certain properties of the routing (such as delay or TCP throughput) without the need to change the standards of the current underlying routing. However, deploying overlay routing requires the placement and maintenance of overlay infrastructure. This gives rise to the following optimization problem: Find a minimal set of overlay nodes such that the required routing properties are satisfied. In this paper, we rigorously study this optimization problem. We show that it is NP-hard and derive a nontrivial approximation algorithm for it, where the approximation ratio depends on specific properties of the problem at hand. We examine the practical aspects of the scheme by evaluating the gain one can get over several real scenarios. The first one is BGP routing, and we show, using up-to-date data reflecting the current BGP routing policy in the Internet, that a relative small number of less than 100 relay servers is sufficient to enable routing over shortest paths from a single source to all autonomous systems (ASs), reducing the average path length of inflated paths by 40%. We also demonstrate that the scheme is very useful for TCP performance improvement (results in an almost optimal placement of overlay nodes) and for Voice-over-IP (VoIP) applications where a small number of overlay nodes can significantly reduce the maximal peer-to-peer delay. Keywords— Overlay network, resource allocation.
Novel Weighted Hybrid Approach in Recommendation Method
Mr. Avadhut D. Wagavkar, Mrs. S.S.Vairagar
In modern E-Commerce it is not easy for the customers to find the best goods of their interest as there are millions of products available online. Recommendation systems are one of information filtering systems forecasting the items that may be additional interest for user within a big set of items on the basis of user’s interests. This System utilizes the Collaborative filtering, which offers a few recommendations to users on the basis of matches in behavioral and useful examples of users and furthermore demonstrates comparable affection and behavioral examples with those users. The paper presents an approach for Recommendation System to generate meaningful recommendations to a collection of users for items or products that might interest them. This approach uses weighted hybrid recommendation system which combines content based recommendation system and knowledge based recommendation system in order to increase the overall performance of the system. The main idea is using multiple recommendation techniques to suppress the drawbacks of the traditional techniques or an individual technique in a combined model. The paper presents a system to improve the accuracy of recommendation in big data application.
Role of Internet of Things in Smart Passenger Cars
G.Vidhya Krishnan M.Valan Rajkumar D.UmaKirthika
The rapid development of the Internet of Things (IoT) and Smart Things provides an opportunity for the informationization for the automotive industry. Smart Things is another paradigm shift in IT world. Smart Things are the things that are having embedding smartness or intelligence, identification, automation, monitoring and controlling calibre. Smart Things are assisting human life a lot, nowadays without their applications life is becoming cumbersome. The introduction of the concept of the Internet of things in the automotive industry will carry on the unified tracking, monitoring and managing and processing the entire automobile car operation, and has become a new trend. This paper presents the role of Internet of things and the new technologies in making the passenger car smarter. This paper exhibits systematically on Internet, Things, and then explores on Internet of Things and finally Smart Things from researchers’, and corporate perspective. Moreover, this article focuses on the state of Smart Things and its applications. This in turn would help the new researchers, who want to do research in this IoT domain
A Study of Various Bone Fracture Detection Techniques
Irfan Khatik
The bone fracture is common problem in human beings due to accident or other causes like bone cancer etc. The fracture can occur in any bone of our body like wrist, heel, ankle, hip, rib, leg, chest etc. It is not possible to view fractures by naked eyes, so X-ray/CT images are used to detect it. But sometimes these images lack sufficient details needed to diagnose. Now a days image processing is playing an important role in bone fracture detection. Image processing is important in modern data storage and data transmission especially in progressive transmission of images, video coding (teleconferencing), digital libraries, image database, and remote sensing. This paper presents a study of image processing techniques for bone fracture detection. This paper will help user to study different methods for bone fracture detection using image processing and to design new techniques to improve accuracy of fracture detection. This paper also presents technologies used to implement image processing based system for fracture detection with pros and cons.
Prof. Butkar U D Ms. Sasane Minal Ms. Sonali Salpure
A Formation of Cloud Data Sharing With Integrity and User Revocation
Prof. Butkar U D Ms. Sasane Minal Ms. Sonali Salpure
Cloud computing and storage services, data is not only stored in the cloud, but routinely shared among a large number of users in a group. It remains elusive, however, to design an efficient mechanism to audit the integrity of such shared data, while still preserving identity privacy. In this paper, we propose Knox, a privacy-preserving auditing mechanism for data stored in the cloud and shared among a large number of users in a group. In particular, we utilize group signatures to construct homomorphic authenticators, so that a third party auditor (TPA) is able to verify the integrity of shared data for users without retrieving the entire data. Meanwhile, the identity of the signer on each block in shared data is kept private from the TPA. With Knox, the amount of information used for verification, as well as the time it takes to audit with it, are not affected by the number of users in the group. In addition,Knox exploits homomorphic MACs to reduce the space used to store such verification information. Our experimental results show that Knox is able to efficiently audit the correctness of data, shared among a large number of users.
An Efficient Approach for Image Filtering by Directional Neighborhood with wavelets
Dr. Smrity Prasad
Image Processing refers to the use of algorithm to perform processing on digital image. Microscopic images like some microorganism images contain different type of noises which reduce the quality of the images. Removing noise is a difficult task. Noise removal is an issue of image processing. Images containing noise degrade the quality of the images. Removing noise is an important processing task. After removing noise from the images, the visual effect will not be proper. This paper presents an approach to de-noise based on averaging of pixels in 5X5 window and wavelets is proposed.
Internet of Things: A Survey on Security Issues Analysis and Countermeasures
B.Sasikala M. Rajanarajana Dr. B. Geethavani
The Internet of Things (IoT) is becoming one of the milestones in the era of communication and networking which is going to determine future of IT. The explanation goes on to say that “The Internet of Things is such a radical concept that it is a challenge to even imagine all the possible ways in which it will affect business, economies, and society”. Internet-of-Things (IoT) is the junction of Internet with RFID, Sensor and smart objects. IoT can be defined as “things belonging to the Internet” to supply and access all of real-world information. The Internet of Things (IoT) is a pervasive Internet-based network. Although it makes appreciable development, there are still uncertainties about security concepts of its usage that is usually considered as a major concern in the design of IoT architectures. However, the IoT exhibits characteristics that pose considerable risks: inherent openness, heterogeneity, and terminal vulnerability. This paper mainly focusing on survey of analyzing all security issues and suggested countermeasure. And as IoT contains four layers: perception layer, network layer, support layer and application layer, this paper will analyze the security problems of each layer separately. The study defines security requirements and challenges that are common in IoT implementations and discusses security threats and related solutions to make this technology secure and more prevalent accordingly and suggested further areas of research needed.
Review Paper on Image Enhancement and Its Techniques
Amanjot Kaur Randhawa Alka Bamotra
Image enhancement is one of the important technique in image processing field. The main objective of this technique is to improve the quality and information of the image and to provide better visualization to the image. In this paper we have used two techniques to enhance the quality of an image. These two are histogram and fuzzy logic. Histogram and fuzzy techniques can be used to enhance the quality of image. Fuzzy logic can be used to interpret human knowledge in the form of fuzzy if-then rules. Histogram technique is usually used to increase the contrast of an image. This paper presents the review of different histogram and fuzzy techniques used.
Joseph Elijah, Dr. Amit Mishra M. Usman Gana , Engr. Mathew Chukwu Udo Prof. Abiodun Musa Aibinu
Staff Monitoring System Using Biometric
Joseph Elijah, Dr. Amit Mishra M. Usman Gana , Engr. Mathew Chukwu Udo Prof. Abiodun Musa Aibinu
Millions of naira is been lost annually in organizations across Nigeria as a result of poor services been rendered to various clients in organizations, this is due to the facts that proper attendance management system is not in place in various organizations across the country. The management of staff's attendance record daily has become a difficult challenge. The effort required in generating monthly report and also knowing the cumulative numbers of staffs has become a major task as manual assessment produces errors, and also it is time consuming. For the stated reason, an effective electronic staff attendance system using fingerprint is introduced in this work. This system will take attendance electronically with the aid of a fingerprint scanner (fingerprint device) and the attendance records are stored in the application storage unit (database). Attendance is marked after staff identification. For identification of staff, a fingerprint scanner is used. This process eradicates the need for stationary materials for record keeping; this will eliminate the issues of impersonation. This paper proposes the use of fingerprint biometric system to eliminate the problem being faced by traditional paper and pencil attendance register being provided in organizations.
Experimental investigation of strength properties of concrete with partial replacement of cement with glass powder and fine aggregate with foundry sand
Sunil Kumar .V.S Lokesh.J.K
Management of natural income and preservation of environment is necessary thing. Rapid growth of industrialization has resulted the production of huge volume of wastes, equally in solid and liquid in manufacturing zones. It’s apparent that around 10- 15% of wastes formed are hazardous and creation of hazardous wastes is increasing at the rate of 2-5% per year. These generated waste were dumped on land or discharged in to water bodies and thus becomes a large source of environment pollution and wellbeing threats. This study grants the evidence about use of industrial wastes as a suitable material for construction purposes, by which cost of construction can be condensed and also a safe disposal of waste materials can be achieved. In the present study cement will be partly replaced by glass fine particles (5%, 10%, 15%, and 20%) and fine aggregates will be partially replaced by foundry sand (5%, 10%, 15%, and 20%). The strength factors such as compressive strength, split tensile strength will be conducted for both 7 days and 28 days of curing period. Based on the test results suitable proportion of substitution will be decided.
Efficient Defense Mechanism against Sybil Attack in Wireless Sensor Network
Priyanka A
Sensor network consists of tiny sensors and actuators with general purpose computing elements to cooperatively monitor physical or environmental conditions, such as temperature, pressure, etc. Wireless Sensor Networks are uniquely characterized by properties like limited power they can harvest or store, dynamic network topology, large scale of deployment.
Modeling and Performance Analysis of BLDC Motor under Different Operating Speed Conditions
Karthik K , R Kiran Kumar Panisetty Sreenivasulu
The modeling and performance analysis of BLDC motor under different operating speed conditions has been presented in this paper. BLDC motors have been gaining attention from various Industrial and household appliance manufacturers, because of its high efficiency, high power density, and low maintenance cost. After many research and developments in the fields of magnetic materials and power electronics, their applications to electric drives have increased to a significant extent. In this paper, the modeling of Brushless DC motor drive system along with control system for speed and current has been presented using MATLAB / SIMULINK. In order to evaluate the model, various cases of simulation studies are carried out. Test results thus obtained show that the model performance is satisfactory.
Implementation of Railway Track Crack Detection and Protection
N.Karthick R.Nagarajan S.Suresh , R.Prabhu
In this world people uses various types of transportation system to travel from one place to another place. Mostly they give importance to public transportation for safer journey. At the same time the transport departments check out the safety measures implemented in them. The proposed system is suitable for railways transportation to identify the cracks in the railway tracks earlier and prevent the accidents. In this paper to use crack detection sensor, this will be placed in the train engine. By this, if some crack is detected on the track the train starts to slow and stop at respective point automatically and exact place of crack would be given to control room. Secondly the next cause of accidents is prevented from two trains opposite in same track by using the same sensors fitted in the engine, if the sensor senses the same signal from opposite train then it automatically applies the brake and stops the train at certain distance. The derailment causes several loses in railway accidents. The proposed system introduces Bluetooth based technology, to prevent the trains accident. The Bluetooth device is installed at each front end of the locomotive. If the train starts to derail, automatically signal is breaked and an alert is given to engine driver and on the other emergency brake is applied automatically. The main aim of the work is to avoid the train accidents without manual power.
This system is based on fatigue detection using smartphone. Drowsiness of the driver will be detected by this system when the driver is driving the vehicle. Alert will be generated when a reverie is detected by the system. To detect the reverie some parameter are consider such as yawning, eyes blinking and head shaking. The Harr-like technique is used for detecting face expression and eye’s blinking. And for detecting yawning the Canny Active Contour method is used.
Currently a days advanced cellular cell phone customers are increasing a extensive measure. An extensive wide variety of customers are utilising cell telephones to speak with every different. A cell phone customer is offered to exceptional risks once they make use of their phone for correspondence. Those dangers can disenchanted the operation of the mobile phone, and transmit or modify purchaser statistics rather than unique. So applications have to make certain security and uprightness of the facts. unmarried touch portable protection cannot provide effective execution for nonpublic information. Consequently we are moving closer to multitouch portable protection for excessive protection. In registering, multi-touch is innovation that empowers a surface to understand the nearness of extra than at the least one than two purposes of touch with the contact screen. Through utilizing specific contact focuses to verify customer for get to private records in mobile telephones. in this paper we are taken into consideration biometric motions to validate customer thru multitouch finger focuses for extra security.
Nowadays distributed systems are used everywhere. In distributed environment as there are numbers of processes running in the environment from which some processes are not required to execute for that specific instance. To schedule that process and balance the energy load in network traffic. We use the OFF concept. In these OFF concept, we close the unwanted process running in the background using the Ad-hoc network. In private cloud it is not possible to administrate all machines at the same instance of time, to overcome this problem propose system gives the notification message to the administrator when particular machine having greater load value. This system also provides the remote operation of processes using an android device. The Administrator can remotely shut down the systems as well as stop the unwanted processes. Also, this provides the single URL for the same task in the absence of android device. An evaluation and comparative study of the proposed approach provides evidence of its merits in terms of elasticity, energy efficiency, and scalability, as well as of its feasibility in the presence of high workload rate.
DeyPos is a useful cryptographic primitive that permits a user to check the integrity and systematically update the files in a cloud server. There has been many solutions proposed for Dynamic Proof of Storage in singleuser environment but for multi user problems is still unsolvable. A multi-user cloud storage system needs the secure client side cross user deduplication technique, which allows a user to stop the uploading process and gain the ownership of the files immediately, when other owners of the same files have uploaded them to the cloud server.As we know, none of the existing dynamic PoSs can support this technique. In this paper, we elaborate the concept of deduplicatable dynamic proof of storage and propose an efficient construction called DeyPoS, to achieve dynamic Proof of Storage and secure cross-user deduplication, simultaneously.To build a novel tool called Homomorphic Authenticated Tree (HAT) to address challenges such as structure diversity and private tag generation.Hence we prove the security of our construction, and the theoretical analysis and experimental results show that our research is practically valid and applicable.
Deployment of Data Base as a Service and connecting it with the local server
Kaustubh Rai Dr. Abhineet Anand
Cloud Computing, is the on-demand delivery of computing resources-everything from applications to traditional IT infrastructure(Data centers)-over the internet on the pay-for-use basis. Cloud Computing is the current need of the IT industry. Cloud Computing offers on demand internet based IT services like IaaS(Infrastructure as a Service), PaaS(Platform as a Service), DBaaS(DataBase as a Service), etc. With the exponential increase of the IT industry it is very difficult to maintain all the resources physically and hence the Cloud computing comes into the picture. Every IT industry requires data to be maintained and updated constantly and datacenters in the traditional IT has proved to be inefficient. Datacenters have huge unused resource which too requires capital. With the increase of data, it becomes very difficult to manage the data in the physical resources and hence companies use DBaaS (DataBase as a Service), where the data is saved on the servers which are not physically present at that location. Pre-configured and pre-defined structure of the database is present and hence deploying and maintaining the database becomes easy. With the deployment of DBaaS, analyzing the performance and optimization of the database is much better than doing the same in physical database.
Nalavadi Srikantha Khaja Moinuddin Lokesh K S , Aswatha Narayana
Waste Management in IoT- Enabled Smart Cities: A Survey
Nalavadi Srikantha Khaja Moinuddin Lokesh K S , Aswatha Narayana
— The new era of Web and Internet of Things (IoT) paradigm is being enabled by the proliferation of various devices like RFIDs, sensors, and actuators. Smart devices (devices having significant computational capabilities, transforming them to ‘smart things’) are embedded in the environment to monitor and collect ambient information. In a city, this leads to Smart City frameworks. Intelligent services could be offered on top of such information related to any aspect of humans’ activities. A typical example of services offered in the framework of Smart Cities is IoT-enabled waste management. Waste management involves not only the collection of the waste in the field but also the transport and disposal to the appropriate locations. In this paper, we present a comprehensive and thorough survey of ICT-enabled waste management models. Specifically, we focus on the adoption of smart devices as a key enabling technology in contemporary waste management. We report on the strengths and weaknesses of various models to reveal their characteristics. This survey sets up the basis for delivering new models in the domain as it reveals the needs for defining novel framework for waste management
New Multicast Routing Protocols for Mobile Adhoc networks
Harendra Kumar, Madan Kushwaha
The majority of applications are in areas where quick deployment and dynamic reconfiguration are necessary and a wire network is not available for that areas. These include military battlefields, emergency search and rescue sites, classrooms, and conventions where participants share information dynamically using their wireless devices. Well established routing protocols do exist to offer efficient multicasting service in conventional wired networks. These protocols, having been designed for fixed networks, may fails to keep up with node movements and frequent topology changes in a MANET. Therefore, adapting existing wired multicast protocols as such to a MANET, which completely lacks infrastructure, appear less promising. Providing efficient multicasting over MANET faces many challenges, includes scalability, quality of service, reliable service, security, Address configuration, Applications for multicast over MANET. The existing multicast routing protocol do not addresses these issues effectively over Mobile Adhoc Networks (MANET).
Secure Data Transfer: Based on Steganography and Visual Cryptography
Rini K D.Rajapriya
Secure data transfer is one of the most important concern with the internet users who are transmitting highly secures information through internet. We have various technologies available to overcome this issue and the main includes the steganographic and visual cryptographic techniques. Using steganography, messages senders can hide their secure data in image, audio or video files. Images are widely used because of its availability as well as there are millions of images are transmitted through internet in each fractions of second, which makes them an excellent cover for secure messages. Steganography got a challenger in the form of steganalysis who can recreate the secure data from the message using various steganalysis techniques. Visual cryptography is another important method which provides 2 way authentication, where the user the needs to get all the shares of the image to complete the required action. In this paper, we have presented a system which uses both the concepts of steganography and visual cryptography to securely transfer data. The secured message is hidden in the image using the steganographic LSB and then the images are partitioned into shares and send separately to the receiver. The receiver needs all the shares to recover the image with hidden message and then the message to be decoded from the image.
The integration of knowledge management (KM) and e-learning (EL) become inevitable day by day. KM applications focus in providing institutions with tools to enrich knowledge, while the EL focuses on managing the delivery of academic knowledge. But integration of both the areas is far more behind in research. This research proposed a KM model to provide 24x7 hours synchronous collaborative learning. Requirement of KM in EL is the focus of this paper by creating a new approach of KM and emphasizing on various processes accompanying. Several Artificial Intelligence (AI) tools and technologies such as big data, linked data, semantic web, 3D visualization, etc. are incorporated hypothetically to achieve the collaborative learning environment.
Biomedical Named Entity Recognition - a swift review
S.Vijaya Dr.R.Radha
The main focus of this paper is taking a swift review on the Biomedical Named Entity Recognition which is the most complex task in Information Extraction. This paper analyses various methods used for NER particularly in the field of Biomedical domain. The aim of this study is to discuss about the methods used to recognize Biological entities like genes, proteins and diseases etc., and propose an effective method to recognize heterogeneous entities.
Data Access Control with Revocable Multiauthority Cloud Storage
P.Srilakshmi Dr.A.V.R.Mayuri K.Asha Rani
: Data access control is an effective way to ensure the data security in the cloud. Due to data outsourcing and untrusted cloud servers, the data access control becomes a challenging issue in cloud storage systems. Cipher text-Policy Attribute based Encryption (CPABE) is regarded as one of the most suitable technologies for data access control in cloud storage, because it gives data owners more direct control on access policies. However, it is difficult to directly apply existing CP-ABE schemes to data access control for cloud storage systems because of the attribute revocation problem. In this paper, an expressive, efficient and revocable data access control scheme for multiauthority cloud storage systems, where there are multiple authorities co-exist and each authority is able to issue attributes independently. Precisely, a revocable multi-authority CP-ABE scheme, and apply it as the underlying techniques to design the data access control scheme. A attribute revocation method can efficiently achieve both forward security and backward security.
A Machine Learning Approach for Early Prediction of Breast Cancer
Younus Ahmad Malla Mohammad Ubaidullah Bokari
Nowadays by the rapid digitization of the data in the Healthcare sector has resulted in the collection of mountains amount of data in various Electronic Health Records (EHR). As the data is the biggest asset in the modern age, whose proper utilization in the Healthcare sector can lead to the discovery of the dreadful diseases very well in time which in turn will provide high quality of care to patients and at less expenditure. Breast Cancer is a primary cause of death in women whose precise detection of Breast Cancer is important in early stages. Precise results can be achieved through data mining algorithms. Developing a machine learning models that can help us in prediction the disease can play a vital role in early prediction. These Machine learning methods can be used to classify between healthy people & people with different disease. In the given project the light is been thrown on the same disease by using certain selected machine learning algorithms in WEKA tool and a corresponding evaluation of the selected Machine learning algorithms in terms of accuracy is also performed so as to select the best classifier for the early diagnosis of the said disease with better accuracy results In this paper three different types of models were implemented on the Breast Cancer dataset as Naïve Bayes, Logistic Regression and Random Forest. Out of the three Random Forest lead the top by having accuracy of 98% and sensitivity 99% followed by Logistic Regression with accuracy of 96% and sensitivity 98% and finally with Naive Bayes with accuracy of 91% and sensitivity 94%.